WGU C836 OA Study Guide (Overly Informative)

0.0(0)
studied byStudied by 7 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/274

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

275 Terms

1
New cards
CIA Triad
Confidentiality, Integrity, Availability
2
New cards
Parkerian hexad
Where the CIA triad consists of confidentiality, integrity, and availability, the Parkerian hexad consists of these three principles, as well as possession or control, authenticity, and utility
3
New cards
Confidentiality
Refers to our ability to protect our data from those who are not authorized to view it.
4
New cards


5
New cards
Confidentiality can be compromised by the loss of a laptop containing data, a person looking over our shoulder while we type a password, an e-mail attachment being sent to the wrong person, an attacker penetrating our systems, or similar issues.

6
New cards
Integrity
Refers to the ability to prevent our data from being changed in an unauthorized or undesirable manner. This could mean the unauthorized change or deletion of our data or portions of our data, or it could mean an authorized, but undesirable, change or deletion of our data. To maintain integrity, we not only need to have the means to prevent unauthorized changes to our data but also need the ability to reverse authorized changes that need to be undone.
7
New cards
Availability
refers to the ability to access our data when we need it. Loss of availability can refer to a wide variety of breaks anywhere in the chain that allows us access to our data. Such issues can result from power loss, operating system or application problems, network attacks, compromise of a system, or other problems. When such issues are caused by an outside party, such as an attacker, they are commonly referred to as a denial of service (DoS) attack.
8
New cards
Possession or Control
Refers to the physical disposition of the media on which the data is stored. This enables us, without involving other factors such as availability, to discuss our loss of the data in its physical medium
9
New cards


10
New cards
An example is data store be on multiple devices and there could be numerous versions.

11
New cards
Authenticity
Attribution as to the owner or creator of the data in question.
12
New cards


13
New cards
Authenticity can be enforced through the use of digital signatures.

14
New cards
Utility
Refers to how useful the data is to us.
15
New cards
Interception
Interception attacks allow unauthorized users to access our data, applications, or environments and are primarily an attack against confidentiality. Interception might take the form of unauthorized file viewing or copying, eavesdropping on phone conversations, or reading e-mail, and can be conducted against data at rest or in motion. Properly executed, interception attacks can be very difficult to detect.
16
New cards


17
New cards
Affects Confidentiality

18
New cards
Interruption
Interruption attacks cause our assets to become unusable or unavailable for our use, on a temporary or permanent basis. Interruption attacks often affect availability but can be an attack on integrity as well. In the case of a DoS attack on a mail server, we would classify this as an availability attack.
19
New cards


20
New cards
Affects Integrity and availability

21
New cards
Modification
Modification attacks involve tampering with our asset. If we access a file in an unauthorized manner and alter the data it contains, we have affected the integrity of the data contained in the file.
22
New cards
Fabrication
Fabrication attacks involve generating data, processes, communications, or other similar activities with a system. Fabrication attacks primarily affect integrity but could be considered an availability attack as well. If we generate spurious information in a database, this would be considered to be a fabrication attack.
23
New cards


24
New cards
Affects Integrity and Availability

25
New cards
Threat
Something that has potential to cause harm
26
New cards
Vulnerability
Weaknesses that can be used to harm us
27
New cards
Risk
Likeliness that something bad will happen
28
New cards
Impact
The value of the asset is used to assess if a risk is present
29
New cards
Something you know
Password or PIN
30
New cards
Something you are
An authentication factor using biometrics, such as a fingerprint scanner.
31
New cards
Something you have
Authentication factor that relies on possession (FOB, Card, Cell Phone, Key)
32
New cards
Something you do
An authentication factor indicating action, such as gestures on a touch screen.
33
New cards
Multifactor Authentication
Uses one or more authentication methods for access
34
New cards
Mutual Authentication
A security mechanism that requires that each party in a communication verify its identity.
35
New cards


36
New cards
Can be combine with multifactor authentication.

37
New cards


38
New cards
In mutual authentication, not only does the client authenticate to the server, but the server authenticates to the client as well. Mutual authentication is often implemented through the use of digital certificates. Both the client and the server would have a certificate to authenticate the other.

39
New cards
Biometric: Universality
Characteristics in the majority of people we expect to enroll for the system.
40
New cards
Biometric: Uniqueness
Measure of how unique a particular characteristic is among individuals
41
New cards
Biometric: Permanence
How well a particular characteristic resists change over time and with advancing age.
42
New cards
Biometric: Collectability
How easy it is to acquire a characteristic with which we can later authenticate a user
43
New cards
Biometric: Performance
Set of metrics that judge how well a given system functions. Such factors include speed, accuracy, and error rate
44
New cards
Biometric: Acceptability
A measure of how acceptable the particular characteristic is to the users of the system
45
New cards
Biometric: Circumvention
Describes the ease with which a system can be tricked by a falsified biometric identifier.
46
New cards
Risk Management Process
1. Identify Asset
47
New cards
2. Identify Threats

48
New cards
3. Assess Vulnerabilities

49
New cards
4. Assess Risk

50
New cards
5. Mitigate Risk

51
New cards
Logical Controls
Sometimes called technical controls, these protect the systems, networks, and environments that process, transmit, and store our data
52
New cards
Physical Controls
Controls to protect the organization's people and physical environment, such as locks, fire management, gates, and guards; physical controls may be called "operational controls" in some contexts.
53
New cards
Administrative Controls
Procedures implemented to define the roles, responsibilities, policies, and administrative functions needed to manage the control environment.
54
New cards
Incident Response Process
1. Preparation - the policies and procedures that govern incident response and handling in place, conducting training and education for both incident handlers
55
New cards


56
New cards
2. Detection and Analysis - detect the occurrence of an issue and decide whether or not it is actually an incident

57
New cards


58
New cards
3. Containment, Eradication, and Recovery - ensure that the situation does not cause any more damage

59
New cards


60
New cards
4. Post Incident Activity - determine specifically what happened, why it happened, and what we can do to keep it from happening again

61
New cards
Principle of Least Privilege
Only allow the bare minimum of access to a party—this might be a person, user account, or process—to allow it to perform the functionality needed of it
62
New cards
Discretionary Access Control (DAC)
Model of access control based on access being determined by the owner of the resource in question
63
New cards


64
New cards
Example:

65
New cards
A user who creates a network share and sets permissions on that share

66
New cards
Mandatory Access Control (MAC)
Model of access control in which the owner of the resource does not get to decide who gets to access it, but instead access is decided by a group or individual who has the authority to set access on resources
67
New cards
Role-Based Access Control (RBAC)
Model of access control that set by an authority responsible for doing so, rather than by the owner of the resource.
68
New cards
Attribute-based Access Control (ABAC)
Model of access control that is, logically, based on attributes from a particular person, of a resource, or of an environment.
69
New cards


70
New cards
Example:

71
New cards
VPN connection is set to timeout after a certain time

72
New cards
Multilevel Access Control
An access control model that includes many tiers of security and is used extensively by military and government organizations and those that handle data of a very sensitive nature
73
New cards
Confused Deputy Problem
A type of attack that is common in systems that use ACLs rather than capabilities. The crux of the confused deputy problem is seen when the software with access to a resource has a greater level of permission to access the resource than the user who is controlling the software.
74
New cards


75
New cards
If we, as the user, can trick the software into misusing its greater level of authority, we can potentially carry out an attack

76
New cards
Client-side Attacks
Attacks that take advantage of weaknesses in applications that are running on the computer being operated directly by the user. These attacks can take the form of code sent through the Web browser, which is then executed on the local machine, malformed PDF files, images or videos with attack code embedded, or other forms
77
New cards
Cross-Site Request Forgery (CSRF or XSRF)
An attack that misuses the authority of the browser on the user's computer. If the attacker knows of, or can guess, a Web site to which the user might already be authenticated, perhaps a very common site such as Amazon.com, they can attempt to carry out a CSRF attack [2]. They can do this by embedding a link in a Web page or HTML-based e-mail, generally a link to an image from the site to which he wishes to direct the user without their knowledge. When the application attempts to retrieve the image in the link, it also executes the additional commands the attacker has embedded in it.
78
New cards
Clickjacking (User Interface Redressing)
A client-side attack that involves the attacker placing an invisible layer over something on a website that the user would normally click on, in order to execute a command differing from what the user thinks they are performing.
79
New cards
Accountability
Identification, Authentication, Authorization, and Access.
80
New cards
Nonrepudiation
A situation in which sufficient evidence exists as to prevent an individual from successfully denying that he or she has made a statement, or taken an action
81
New cards
Intrusion Detection
Monitors and reports malicious events
82
New cards
Intrusion Prevention
Alarms and takes actions when malicious events occur
83
New cards
Auditing
The primary means to ensure accountability through technical means.
84
New cards
Penetration Test
Mimic, as closely as possible, the techniques an actual attack would use
85
New cards
Nessus
Vulnerability scanning tool
86
New cards
Caesar Cypher
letter-by-letter method to make a cipher. For each letter, substitute another letter 4 letters ahead. For "a", write "d".
87
New cards
Cryptographic Machines
1. The Jefferson Disk by Thomas Jefferson
88
New cards
2. The Enigma by Arthur Scherbius

89
New cards
Kerckhoffs' Principle
1. The system must be substantial, if not mathematically, undecipherable.
90
New cards


91
New cards
2. The system must not require secrecy and can be stolen by the enemy without causing trouble.

92
New cards


93
New cards
3. It must be easy to communicate and remember the keys without requiring written notes, and it must be easy to change or modify the keys with different participants.

94
New cards


95
New cards
4. The system ought to be compatible with telegraph communication.

96
New cards


97
New cards
5. The system must be portable, and its use must not require more than one person.

98
New cards


99
New cards
6. Finally, regarding the circumstances in which such system is applied, it must be easy to use and must require neither the stress of mind nor the knowledge of a long series of rules.

100
New cards
Symmetric Cryptography
Encryption that uses a single key to encrypt and decrypt a message.